{"id":3443,"date":"2017-02-09T00:00:00","date_gmt":"2017-02-09T00:00:00","guid":{"rendered":"https:\/\/abes.org.br\/?p=3443"},"modified":"2017-02-09T00:00:00","modified_gmt":"2017-02-09T00:00:00","slug":"os-atuais-desafios-da-seguranca-da-informacao","status":"publish","type":"post","link":"https:\/\/abes.org.br\/en\/os-atuais-desafios-da-seguranca-da-informacao\/","title":{"rendered":"Current Information Security Challenges"},"content":{"rendered":"<div style=\"text-align: center;\">\n\t<em><img decoding=\"async\" alt=\"\" src=\"\/wp-content\/uploads\/anterior\/Imagens\/seguran%C3%A7a%203.jpg\" style=\"width: 336px; height: 150px;\" \/><\/em><\/div>\n<div style=\"text-align: center;\">\n\t<em>Interviews with Marcio Kanamaru, from Intel Security, and Ines Brosso, from Mackenzie<\/em><\/div>\n<p>&nbsp;<\/p>\n<div style=\"text-align: justify;\">\n\tInformation security systems aim to ensure the availability, confidentiality and integrity of data in companies, institutions, government agencies and also the information of anyone who uses equipment, such as notebooks and smartphones, on a daily basis. However, the IT environments of organizations and those for personal use are exposed to different vulnerabilities, whether communication, storage, hardware, software and human. Today, there is growing concern about reducing cybercriminal attacks and the risk of security breaches, which represent some of the challenges of information security.<br \/>\n\t&nbsp;<br \/>\n\tFor Ines Bosso, adjunct professor at Mackenzie&#039;s Faculty of Computing and Informatics, \u201cthe main threats continue to be posed by people, who do not pay attention to the risks when they receive and open files on their work and portable equipment, without knowing the source. As a result, we should see an increase in threats from phishing and crypto ransomware and social engineering.\u201d<br \/>\n\t&nbsp;<br \/>\n\tMarcio Kanamaru, general director of Intel Security in Brazil, believes that ransomware threats, which caused so much damage in 2016, should recede by the end of 2017. \u201cThat&#039;s because the impact caused by ransomware will force the security sector to take decisive action . Collaborative initiatives, the development and release of anti-ransomware technologies will reduce the volume and effectiveness of this type of attack during the year.\u201d<br \/>\n\t&nbsp;<br \/>\n\tOn the other hand, Kanamuru points out that the development of more threats aimed at the cloud should grow. \u201cThe increase in trust in cloud services and the increase in companies migrating their operations will eventually attract the attention of cybercriminals looking for sensitive information stored in the cloud. The increase in the number of connected devices should also draw the attention of criminals, who can develop specific attacks for these devices\u201d, he says.<\/p>\n<p>\tBrosso explains that a combination of hardware, software, appliance and a good security policy is important to create a secure environment to protect data and users, including: Router, Firewall, IPS, Next Generation Firewall, WAF, Packet Decrypter, Data Loss Prevention, Proxy, Router, Security Analytics, TAPs, Antivirus, Antiphishing, Antiransomware, HoneyPot, Malware Analysis Engines, in addition to Correlating Logs (SIEM) and monitoring networks with appropriate software. \u201cMany organizations don&#039;t invest in security and don&#039;t update their damaged or vulnerable equipment and software. Others do not even have employees trained in information security, which is a noble area of information technology\u201d, he emphasizes. Among the guidelines, the professor indicates that organizations have an efficient Backup-Restore process, promote training programs in Cyber Security with employees periodically and have a policy for DoS and DDoS attacks.<\/p><\/div>","protected":false},"excerpt":{"rendered":"<p>Entrevistas com Marcio Kanamaru, da Intel Security, e Ines Brosso, do Mackenzie &nbsp; Os sistemas de seguran&ccedil;a da informa&ccedil;&atilde;o visam garantir a disponibilidade, confidencialidade e integridade dos dados em empresas, institui&ccedil;&otilde;es, &oacute;rg&atilde;os do governo e tamb&eacute;m as informa&ccedil;&otilde;es de qualquer pessoa que usa equipamentos, como notebooks e smartphones, no dia a dia. Entretanto, os ambientes [&hellip;]<\/p>\n","protected":false},"author":2,"featured_media":0,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"_et_pb_use_builder":"","_et_pb_old_content":"","_et_gb_content_width":"","footnotes":""},"categories":[19],"tags":[],"class_list":["post-3443","post","type-post","status-publish","format-standard","hentry","category-ultimas-noticias"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.3 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Os atuais desafios da seguran\u00e7a da informa\u00e7\u00e3o - ABES<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/abes.org.br\/en\/os-atuais-desafios-da-seguranca-da-informacao\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Os atuais desafios da seguran\u00e7a da informa\u00e7\u00e3o - ABES\" \/>\n<meta property=\"og:description\" content=\"Entrevistas com Marcio Kanamaru, da Intel Security, e Ines Brosso, do Mackenzie &nbsp; Os sistemas de seguran&ccedil;a da informa&ccedil;&atilde;o visam garantir a disponibilidade, confidencialidade e integridade dos dados em empresas, institui&ccedil;&otilde;es, &oacute;rg&atilde;os do governo e tamb&eacute;m as informa&ccedil;&otilde;es de qualquer pessoa que usa equipamentos, como notebooks e smartphones, no dia a dia. Entretanto, os ambientes [&hellip;]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/abes.org.br\/en\/os-atuais-desafios-da-seguranca-da-informacao\/\" \/>\n<meta property=\"og:site_name\" content=\"ABES\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/ABES.software\" \/>\n<meta property=\"article:published_time\" content=\"2017-02-09T00:00:00+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/abes.org.br\/wp-content\/uploads\/2021\/01\/logo_abes_marca_tagline_horizontal_colorido_rgb.png\" \/>\n\t<meta property=\"og:image:width\" content=\"3509\" \/>\n\t<meta property=\"og:image:height\" content=\"2482\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"prima-dev\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@ABES_SOFTWARE\" \/>\n<meta name=\"twitter:site\" content=\"@ABES_SOFTWARE\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"prima-dev\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/abes.org.br\\\/os-atuais-desafios-da-seguranca-da-informacao\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/abes.org.br\\\/os-atuais-desafios-da-seguranca-da-informacao\\\/\"},\"author\":{\"name\":\"prima-dev\",\"@id\":\"https:\\\/\\\/abes.org.br\\\/#\\\/schema\\\/person\\\/1bad6bff859e7d56ec5664b01968e27e\"},\"headline\":\"Os atuais desafios da seguran\u00e7a da informa\u00e7\u00e3o\",\"datePublished\":\"2017-02-09T00:00:00+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/abes.org.br\\\/os-atuais-desafios-da-seguranca-da-informacao\\\/\"},\"wordCount\":621,\"publisher\":{\"@id\":\"https:\\\/\\\/abes.org.br\\\/#organization\"},\"articleSection\":[\"\u00daltimas not\u00edcias\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/abes.org.br\\\/os-atuais-desafios-da-seguranca-da-informacao\\\/\",\"url\":\"https:\\\/\\\/abes.org.br\\\/os-atuais-desafios-da-seguranca-da-informacao\\\/\",\"name\":\"Os atuais desafios da seguran\u00e7a da informa\u00e7\u00e3o - ABES\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/abes.org.br\\\/#website\"},\"datePublished\":\"2017-02-09T00:00:00+00:00\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/abes.org.br\\\/os-atuais-desafios-da-seguranca-da-informacao\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/abes.org.br\\\/os-atuais-desafios-da-seguranca-da-informacao\\\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/abes.org.br\\\/os-atuais-desafios-da-seguranca-da-informacao\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"In\u00edcio\",\"item\":\"https:\\\/\\\/abes.org.br\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Os atuais desafios da seguran\u00e7a da informa\u00e7\u00e3o\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/abes.org.br\\\/#website\",\"url\":\"https:\\\/\\\/abes.org.br\\\/\",\"name\":\"ABES\",\"description\":\"Associa\u00e7\u00e3o Brasileira das Empresas de Software\",\"publisher\":{\"@id\":\"https:\\\/\\\/abes.org.br\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/abes.org.br\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/abes.org.br\\\/#organization\",\"name\":\"Associa\u00e7\u00e3o Brasileira das Empresas de Software\",\"url\":\"https:\\\/\\\/abes.org.br\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/abes.org.br\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/abes.org.br\\\/wp-content\\\/uploads\\\/2020\\\/09\\\/logo_abes_marca_d_tagline_horizontal_verde-amarelo_cmyk.png\",\"contentUrl\":\"https:\\\/\\\/abes.org.br\\\/wp-content\\\/uploads\\\/2020\\\/09\\\/logo_abes_marca_d_tagline_horizontal_verde-amarelo_cmyk.png\",\"width\":324,\"height\":70,\"caption\":\"Associa\u00e7\u00e3o Brasileira das Empresas de Software\"},\"image\":{\"@id\":\"https:\\\/\\\/abes.org.br\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/www.facebook.com\\\/ABES.software\",\"https:\\\/\\\/x.com\\\/ABES_SOFTWARE\",\"https:\\\/\\\/www.linkedin.com\\\/company\\\/abes-software\\\/\",\"https:\\\/\\\/www.instagram.com\\\/abes_software\\\/\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/abes.org.br\\\/#\\\/schema\\\/person\\\/1bad6bff859e7d56ec5664b01968e27e\",\"name\":\"prima-dev\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/039c6325210cecd393c57645bc755f7d13deed578fddf4dbfa87bc05dcbcfa4b?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/039c6325210cecd393c57645bc755f7d13deed578fddf4dbfa87bc05dcbcfa4b?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/039c6325210cecd393c57645bc755f7d13deed578fddf4dbfa87bc05dcbcfa4b?s=96&d=mm&r=g\",\"caption\":\"prima-dev\"},\"url\":\"https:\\\/\\\/abes.org.br\\\/en\\\/author\\\/prima-dev\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Os atuais desafios da seguran\u00e7a da informa\u00e7\u00e3o - ABES","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/abes.org.br\/en\/os-atuais-desafios-da-seguranca-da-informacao\/","og_locale":"en_US","og_type":"article","og_title":"Os atuais desafios da seguran\u00e7a da informa\u00e7\u00e3o - ABES","og_description":"Entrevistas com Marcio Kanamaru, da Intel Security, e Ines Brosso, do Mackenzie &nbsp; Os sistemas de seguran&ccedil;a da informa&ccedil;&atilde;o visam garantir a disponibilidade, confidencialidade e integridade dos dados em empresas, institui&ccedil;&otilde;es, &oacute;rg&atilde;os do governo e tamb&eacute;m as informa&ccedil;&otilde;es de qualquer pessoa que usa equipamentos, como notebooks e smartphones, no dia a dia. Entretanto, os ambientes [&hellip;]","og_url":"https:\/\/abes.org.br\/en\/os-atuais-desafios-da-seguranca-da-informacao\/","og_site_name":"ABES","article_publisher":"https:\/\/www.facebook.com\/ABES.software","article_published_time":"2017-02-09T00:00:00+00:00","og_image":[{"width":3509,"height":2482,"url":"https:\/\/abes.org.br\/wp-content\/uploads\/2021\/01\/logo_abes_marca_tagline_horizontal_colorido_rgb.png","type":"image\/png"}],"author":"prima-dev","twitter_card":"summary_large_image","twitter_creator":"@ABES_SOFTWARE","twitter_site":"@ABES_SOFTWARE","twitter_misc":{"Written by":"prima-dev","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/abes.org.br\/os-atuais-desafios-da-seguranca-da-informacao\/#article","isPartOf":{"@id":"https:\/\/abes.org.br\/os-atuais-desafios-da-seguranca-da-informacao\/"},"author":{"name":"prima-dev","@id":"https:\/\/abes.org.br\/#\/schema\/person\/1bad6bff859e7d56ec5664b01968e27e"},"headline":"Os atuais desafios da seguran\u00e7a da informa\u00e7\u00e3o","datePublished":"2017-02-09T00:00:00+00:00","mainEntityOfPage":{"@id":"https:\/\/abes.org.br\/os-atuais-desafios-da-seguranca-da-informacao\/"},"wordCount":621,"publisher":{"@id":"https:\/\/abes.org.br\/#organization"},"articleSection":["\u00daltimas not\u00edcias"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/abes.org.br\/os-atuais-desafios-da-seguranca-da-informacao\/","url":"https:\/\/abes.org.br\/os-atuais-desafios-da-seguranca-da-informacao\/","name":"Os atuais desafios da seguran\u00e7a da informa\u00e7\u00e3o - ABES","isPartOf":{"@id":"https:\/\/abes.org.br\/#website"},"datePublished":"2017-02-09T00:00:00+00:00","breadcrumb":{"@id":"https:\/\/abes.org.br\/os-atuais-desafios-da-seguranca-da-informacao\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/abes.org.br\/os-atuais-desafios-da-seguranca-da-informacao\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/abes.org.br\/os-atuais-desafios-da-seguranca-da-informacao\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"In\u00edcio","item":"https:\/\/abes.org.br\/"},{"@type":"ListItem","position":2,"name":"Os atuais desafios da seguran\u00e7a da informa\u00e7\u00e3o"}]},{"@type":"WebSite","@id":"https:\/\/abes.org.br\/#website","url":"https:\/\/abes.org.br\/","name":"ABES","description":"Brazilian Association of Software Companies","publisher":{"@id":"https:\/\/abes.org.br\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/abes.org.br\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/abes.org.br\/#organization","name":"Brazilian Association of Software Companies","url":"https:\/\/abes.org.br\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/abes.org.br\/#\/schema\/logo\/image\/","url":"https:\/\/abes.org.br\/wp-content\/uploads\/2020\/09\/logo_abes_marca_d_tagline_horizontal_verde-amarelo_cmyk.png","contentUrl":"https:\/\/abes.org.br\/wp-content\/uploads\/2020\/09\/logo_abes_marca_d_tagline_horizontal_verde-amarelo_cmyk.png","width":324,"height":70,"caption":"Associa\u00e7\u00e3o Brasileira das Empresas de Software"},"image":{"@id":"https:\/\/abes.org.br\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/ABES.software","https:\/\/x.com\/ABES_SOFTWARE","https:\/\/www.linkedin.com\/company\/abes-software\/","https:\/\/www.instagram.com\/abes_software\/"]},{"@type":"Person","@id":"https:\/\/abes.org.br\/#\/schema\/person\/1bad6bff859e7d56ec5664b01968e27e","name":"prima-dev","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/039c6325210cecd393c57645bc755f7d13deed578fddf4dbfa87bc05dcbcfa4b?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/039c6325210cecd393c57645bc755f7d13deed578fddf4dbfa87bc05dcbcfa4b?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/039c6325210cecd393c57645bc755f7d13deed578fddf4dbfa87bc05dcbcfa4b?s=96&d=mm&r=g","caption":"prima-dev"},"url":"https:\/\/abes.org.br\/en\/author\/prima-dev\/"}]}},"publishpress_future_action":{"enabled":false,"date":"2026-04-15 10:34:55","action":"change-status","newStatus":"draft","terms":[],"taxonomy":"category","extraData":[]},"publishpress_future_workflow_manual_trigger":{"enabledWorkflows":[]},"_links":{"self":[{"href":"https:\/\/abes.org.br\/en\/wp-json\/wp\/v2\/posts\/3443","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/abes.org.br\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/abes.org.br\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/abes.org.br\/en\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/abes.org.br\/en\/wp-json\/wp\/v2\/comments?post=3443"}],"version-history":[{"count":0,"href":"https:\/\/abes.org.br\/en\/wp-json\/wp\/v2\/posts\/3443\/revisions"}],"wp:attachment":[{"href":"https:\/\/abes.org.br\/en\/wp-json\/wp\/v2\/media?parent=3443"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/abes.org.br\/en\/wp-json\/wp\/v2\/categories?post=3443"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/abes.org.br\/en\/wp-json\/wp\/v2\/tags?post=3443"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}